Search Results - (( its application sensor algorithm ) OR ( _ application security algorithm ))*
Search alternatives:
-
1
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
2
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…Wireless sensor networks (WSN) has applications in many areas such as in surveillance, healthcare, national security, military and environmental monitoring. …”
Article -
3
Feasibility of PKC in resource-constrained wireless sensor networks
Published 2008“…By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Public key cryptography in resource-constrained WSN
Published 2008“…By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. …”
Get full text
Get full text
Monograph -
5
-
6
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
Get full text
Get full text
Thesis -
8
A hybrid algorithm of source localization based on hyperbolic technique in WSN
Published 2014Get full text
Get full text
Conference or Workshop Item -
9
Internet of things security vulnerabilities and recommended solutions
Published 2018“…As observed from the review work, providing security for such networks is in its young stage in the form of an integrated architecture offering perfect security together with network and application possibilities although the shortcomings of IEFT and IEEE contribute more towards the same. …”
Get full text
Get full text
Get full text
Article -
10
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Simulation and experiments are performed to validate the design concept of LTDMA scheme and evaluate the sensor node's throughput, power consumption and the efficiency of the proposed embedded algorithms for SHM applications. …”
Get full text
Get full text
Thesis -
11
-
12
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
13
Smart room system with dual authentication
Published 2025“…A numeric keypad for password entry after face verification, a solenoid sensor for door locking, an LED light that can be controlled remotely via a mobile application, a buzzer for detecting failed attempts, and a DHT11 sensor for humidity and temperature monitoring inside the smart room are all equipment of additional IoT hardware. …”
Get full text
Get full text
Get full text
Article -
14
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
Get full text
Get full text
Article -
15
Comparison Of Ridge Filters Performance in Human Vein Extraction Using 850nm Near Infrared Led Illumination
Published 2023“…Vein pattern recognition has gained significant attention in recent years due to its potential applications in various fields such as biometrics, medical diagnosis, and security systems. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
-
17
Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control
Published 1999“…The controller will have its inputs from the sensors that will be mounted on the robot. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Review paper on centroiding algorithm for lunar navigation
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper
